Essays about: "TOTP"

Showing result 1 - 5 of 6 essays containing the word TOTP.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature Review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Asier Iriarte Murgiondo; [2022]
    Keywords : authentication; multi-factor authentication; Universal 2nd Factor; U2F; Timebased One-time Password; TOTP; usability; comparison; autenticación; autenticación de múltiples factores; Universal 2nd Factor; U2F; Time-based One-time Password; TOTP; usabilidad;

    Abstract : Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. READ MORE

  3. 3. Login hardening with Multi-factor Authentication

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Michaela Bergman; [2021]
    Keywords : multi-factor authentication; authentication; security; usability; cost; biometrics; biometric authentication; openid connect; oauth 2.0; PKCE; account recovery; security threats; authentication factors; Technology and Engineering;

    Abstract : The aim with this Master’s Thesis work was to conduct research about different available authenticators, as well as implementing a multi-factor authenticator into the currently used login-application. The research included biometric authentication technologies, and investigation of how to implement these to create a highly secure and customizable multi-factor authentication for My Axis-accounts for Axis Communications in Lund. READ MORE

  4. 4. Investigating Open Source Alternatives for an Electronic Identity System

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Martin Richter; Per Ahlbom; [2016]
    Keywords : Technology and Engineering;

    Abstract : Electronic IDs enable people, companies and organizations to sign documents and authenticate online. Considering the potential losses, the security in an eID system is crucial. The eID system in Sweden today, BankID, is closed source and uses proprietary standards. READ MORE

  5. 5. Two-factor Authentication in Smartphones: Implementations and Attacks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Christofer Ericson; [2015]
    Keywords : Technology and Engineering;

    Abstract : Two-factor authentication is the method of combining two so called authentication factors in order to enhance the security of user authentication. An authentication factor is defined as ”Something the user knows, has or is”. READ MORE